Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Cybersecurity (2)
- Technology (2)
- Trademark (2)
- Certificate of originality (1)
- China National IP Administration (1)
-
- Copyright (1)
- Copyright infringement (1)
- Copyright law (1)
- Copyright protection (1)
- Data (1)
- Digital (1)
- Express license (1)
- FTC (1)
- First Amendment (1)
- HIPAA (1)
- Health care information (1)
- Intellectual property (1)
- Inverse Ratio Rule (1)
- NFT (1)
- Non-fungible tokens (1)
- ODPA (1)
- Ohio Data Protection Act (1)
- Patent (1)
- Spinoff (1)
- Spinout (1)
- Startup (1)
- Technology licensing (1)
- Technology transfer (1)
- Trademark infringement (1)
- USPTO (1)
- Publication Type
Articles 1 - 8 of 8
Full-Text Articles in Law
Ohio's Data Protection Act And/As A Process-Based Approach To "Reasonable" Security, Brian Ray
Ohio's Data Protection Act And/As A Process-Based Approach To "Reasonable" Security, Brian Ray
Akron Law Review
This essay argues that the ODPA [Ohio Data Protection Act], which has become a model for similar laws and legislative proposals in several other states, in effect creates a process-based standard for cybersecurity. It does so by incorporating the risk-based approach used by the listed cybersecurity frameworks as the defacto standard for reasonable security for organizations seeking to qualify for the Act’s affirmative defense. This article summarizes the ODPA and then explains the risk-based approach of the cybersecurity frameworks it incorporates. It then argues that this risk-based approach in effect establishes a process-based definition of reasonable security and explains why …
Security In The Digital Age, Michael Gentithes
Security In The Digital Age, Michael Gentithes
Akron Law Review
Rapidly evolving technology allows governments and businesses to elevate our collective well-being in ways we could not have imagined just decades ago. Data is now a resource that governments and businesses alike can mine to address the world’s needs with greater efficiency, accuracy, and flexibility. But evolving technology and advanced data analytics also come with risk. New digital capabilities also create new means for nefarious actors to infiltrate the complex technological systems at the heart of nearly all of our daily activities. Just as new digital tools emerge to offer unique goods and services, new tools allow wrongdoers to invade …
Conquering Copyright: Why Copyright Needs To Be Modernized Based On Practical Illustrations Of Inconsistent Copyright Precedent, Saipranay Vellala
Conquering Copyright: Why Copyright Needs To Be Modernized Based On Practical Illustrations Of Inconsistent Copyright Precedent, Saipranay Vellala
Akron Law Review
Copyright law establishes an author’s right to secure exclusive rights in their writings. If an author finds an infringing work, the author can file a copyright infringement suit to protect their original writings and stop an infringer from misappropriating their work. In analyzing copyright infringement, however, some legal theories, such as the Inverse Ratio Rule, mischaracterize the crux of the copyright infringement inquiry and complicate the infringement inquiry for judges and juries—adversely affecting authors. Using indie musicians as an exemplary embodiment of modern copyright jurisprudence’s adverse effects, indie musicians who merely have access to a more famous musician’s music may …
Parallel Play: The Simultaneous Professional Responsibility Campaigns Against Unethical Ip Practitioners By The United States And China, Mark A. Cohen
Parallel Play: The Simultaneous Professional Responsibility Campaigns Against Unethical Ip Practitioners By The United States And China, Mark A. Cohen
Akron Law Review
“Parallel Play: The Simultaneous Professional Responsibility Campaigns Against IP Practitioners by the United States and China” describes efforts by the United States Patent and Trademark Office and the China National IP Administration to discipline trademark and patent practitioners through contemporaneous campaign-style approach directed to bad faith filings. At the USPTO, many of these bad faith filings have originated from China. In both countries, these bad faith activities have imposed significant burdens on IP agencies, the courts, and legitimate rights holders. The campaign is likely the largest professional responsibility campaign undertaken by an IP agency, and the largest cross-border IP disciplinary …
Under Nifty Light: Trademark Considerations For The New Digital World, Willajeanne F. Mclean
Under Nifty Light: Trademark Considerations For The New Digital World, Willajeanne F. Mclean
Akron Law Review
Three cases involving non-fungible tokens are grabbing the attention of fashionistas, intellectual property mavens, and metaverse cognoscenti alike. All three are cases of first impression, despite involving trademark infringement claims. All are considered to be cases that will determine whether old trademark principles apply to new technology, and each has compelling and competing arguments that may militate against findings of infringement. While most commentators have focused on the questions surrounding alleged infringement, very few have discussed the challenges of applying remedies, such as injunctions, traditionally used in trademark infringement cases.
This article considers trademark law and examines it in a …
Visualizing Copyright Law: Lessons From Conceptual Artists, Sandra M. Aistars
Visualizing Copyright Law: Lessons From Conceptual Artists, Sandra M. Aistars
Akron Law Review
Copyright law does not require an object to be “art” to be protectable, except in one respect: copyright protection does not extend to useful articles. As a result, courts engage in analysis strikingly similar to that of conceptual artists visualizing art. Copyright law has an uneasy relationship with conceptual art because the Copyright Act also requires works to be original and fixed in a tangible medium. Requirements that have led some to conclude that the kind of art where “the idea or concept is the most important aspect of the work” should not be protectable by copyright.
This article examines …
Protecting Public Health Amidst Data Theft, Sludge, And Dark Patterns: Overcoming The Constitutional Barriers To Health Information Regulations, Jon M. Garon
Akron Law Review
Public health has grown to over $4.1 trillion in spending in the past year, yet for millions of people, their health care is ineffective and sometimes harmful. New technologies have improved health access and treatment, but they can expose an individual’s personal health information to theft and misuse. There is little or no regulation for the reuse of data once it has been lawfully collected for general purposes. Any observer can create a detailed personal diary of an individual or a population by building from a mosaic of inferential data—such as lawfully obtained zip code information, non-regulated health care application …
Standard Licensing Template For University Of Akron Startups, Drew Horton
Standard Licensing Template For University Of Akron Startups, Drew Horton
Williams Honors College, Honors Research Projects
In order to facilitate fast, equitable, and effective sublicensing to University of Akron technology startups, spinoffs, and spinouts, an express license was developed. This expresses license was developed by benchmarking existing terms in order to determine market rates. Universities, venture capital firms, and nonprofits were interviewed in order to establish a set of best practice guidelines for the creation of the express license. These results were then tabulated and statistically analyzed in order to determine a series of startup friendly terms that support the University of Akron’s interests. A series of express licenses were then developed from this data. These …